ICT4Peace Founda on
ICT4Peace, Crisis Informa on Management and Cybersecurity Policy
Dr. Daniel Stauffacher, President, ICT4Peace Founda on www.ict4peace.org
The UN World Summit on the Information Society (WSIS) in Geneva 2003 and Tunis 2005
• Paragraph 36 of the World Summit on the Information Society (WSIS) Tunis Declaration (2005):
• “36. We value the potential of ICTs to promote peace and to prevent conflict which, inter alia, negatively affects achieving development goals. ICTs can be used for identifying conflict situations through early- warning systems preventing conflicts, promoting their peaceful resolution, supporting humanitarian action, including protection of civilians in armed conflicts, facilitating peacekeeping missions, and assisting post conflict peace-building and reconstruction.”between peoples, communities and stakeholders involved in crisis management, humanitarian aid and peacebuilding. ICT4Peace interlinked Areas of Work:
1. CRISIS Informa on Management (Humanitarian, Peacekeeping and Human Rights) including using ICTs, new media etc.
2. Cyber Security Policy Research, Diplomacy and Capacity Building ICT4Peace interlinked Areas of Work:
1. CRISIS Informa on Management including using ICTs, new media etc.
2. Cyber Security Policy and Diplomacy New Tools: Mapping and Crowdsourcing for CiM - Learning from Kenya 2007, Hai 2010, Libya, Typhoon Yolanda etc. etc. Information break-down in crisis situation
•Twi er •Flickr •Blogs •SMS / MMS / Mobiles New media •Social networks •GIS •Crowdsourcing •Drones
•CNN / BBC / Al Jazeera Mainstream •Local / Na onal TV and radio •Print media (mainstream / regional) media •Alterna ve print media
•Sit reps Tradi onal •Open Data Open Gov Data •Humanitarian Informa on Centres •Agency databases / email lists Sources •Personal contacts / rela onships
8 UN Secretary-General 2010 Crisis Informa on Strategy (A/65/491)
• Crisis information management strategy. The Crisis Information Management Strategy is based on the recognition that the United Nations, its Member States, constituent agencies and non-governmental organizations need to improve such information management capacity in the identification, prevention, mitigation, response and recovery of all types of crises, natural as well as man- made. The strategy will leverage and enhance this capacity and provide mechanisms to integrate and share information across the United Nations system.
• The Office of Information and Communications Technology (CITO), together with the Office for the Coordination of Humanitarian Affairs (OCHA), the Department of Peacekeeping Operations and the Department of Field Suppor (DPKO and DFS), has worked closely with United Nations organizations such as the Office of the United Nations High Commissioner for Refugees (UNHCR), the United Nations Children’s Fund (UNICEF), the United Nations Development Programme (UNDP) and WFP and other entities such as the ICT for Peace Foundation in developing and implementing this strategy. It is envisaged that membership will be expanded to include other United Nations organizations in the near future. CIM Strategy
CiMS Business Drivers Vision Technology Drivers
STRATEGIC PROGRAMMES
Informa on Technology Stakeholder Capacity Architecture/ Development Management Building Governance
Cri cal Success Factors •Leadership • Funding • Evalua on • Incrementalism
Outcomes CiM Training Course for IM using ICTs and big data, social and new media, ENTRI Course in Cooperation with ZIF and FBA Examples of further ICT4Peace work, including Using ICTs for elec on monitoring, Cons tu on building etc.
The Cybersecurity Challenge
• Many states are pursuing military cyber-capabili es: UNIDIR Cyber Index: more than 114 na onal cyber security programs world-wide, more than 45 have cyber-security programs that give some role to the armed forces.
• A private can obtain, train and use cyber weapons of war.
• Damaging of a country’s certain cri cal infrastructure: power, transport, financial sector etc. is possible.
• The step from common crime to poli cally mo vated acts, even terrorism, is not far.
The Cybersecurity Challenge
• An exclusive, all-out cyber-war has not happened yet, but a acks have happened as part of conflicts
• However, Cyber Capabili es do not fit tradi onal security strategies (deterrence, denial), because: – Problem of a ribu on of an a ack – Rapidly evolving technology produced and in the hands of the private sector – Use of Non-State actors, Proxies
• Arms control agreements (so far) unrealis c for cyber capabili es – Mul ple actors, both state and non-state actors – No commonly accepted defini on of a cyber weapon so far
The Cyber Security Challenge: What Can be Done ?
• These scenarios show that we need:
– to engage in an interna onal discussion on the norms and principles of responsible state behavior in cyber space, including on the conduct of cyber warfare, and its possible exclusion
– In order to establish a universal understanding of the norms and principles of responsible state behavior in cyber space, we need to turn to the United Na ons (such as UN GA, UNGGE, WSIS Geneva Ac on Line 5)
– To prevent an escala on we need to develop Confidence Building Measures (CBMs) (e.g. Bilateral Agreements, OSCE, ARF, UN GGE)
– We need Capacity Building at all levels (policy, diploma c and technical) to include also developing and emerging countries
UN Group of Governmental Experts (GGE) on Cybersecurity – 2015: First Set of Peace me norms of responsible State behaviour
• GGE report confirmed that ‘interna onal law, par cularly the UN Charter, is applicable and essen al to maintaining peace and stability and promo ng an open, secure, peaceful and accessible ICT environment’.
• A State should not conduct or knowingly support ICT that inten onally damages cri cal infrastructure or otherwise impairs the use and opera on of cri cal infrastructure to provide services to the public
• States should not knowingly allow their territory to be used for interna onally wrongful acts using ICTs;
• States should consider how best to cooperate to exchange informa on, assist each other, prosecute terrorist and criminal use of ICTs, and implement other coopera ve measures to address such threats.
• At the same me, efforts to address the security of ICTs would need to go ‘hand-in-hand with respect for human rights and fundamental freedoms as set forth in the Universal Declara on of Human Rights and other interna onal instruments.
Cybersecurity and Resilient Internet International Processes: Council of Europe, OSCE, UN GGE, London, ARF Example CBMs Confidence Building Measures: Important Progress at OSCE (CH Presidency) • Nomina ng contact points;
• Providing their na onal views on various aspects of na onal and transna onal threats to and in the use of Informa on and Communica on Technologies;
• Facilita ng co-opera on among the competent na onal bodies and exchanging informa on;
• Holding consulta ons in order to reduce the risks of mispercep on, and of possible emergence of poli cal or military tension or conflict that may stem from the use of Informa on and Communica on Technologies;
• Sharing informa on on measures that they have taken to ensure an open, interoperable, secure, and reliable Internet , and on their na onal organiza on; strategies; policies and programs;
• Using the OSCE as a pla orm for dialogue, exchange of best prac ces, awareness- raising and informa on on capacity-building; ICT4Peace Report on Transparency and Confidence Building Measures (TCBMs)**
** see Report by Camino Kavanagh, Senior Advisor ICT4Peace: h p://ict4peace.org/what-next-building-confidence-measures-for-the-cyberspace/ ICT4Peace workshop at ETH Zurich June 2013 with the Support of the Swiss Ministry of Foreign Affairs BILATERAL EFFORTS IN THE FIELD OF INTERNATIONAL AND REGIONAL SECURITY Track 1, 1.5 and 2 Dialogues
ICT4Peace Cybersecurity policy and diplomacy capacity building program with different regional organisa ons.
WHAT ROLE FOR CIVIL SOCIETY AND INDUSTRY IN FURTHERING CYBERSECURITY-RELATED NORMS AND CBMS, PARTICULARLY GIVEN THE UN GGE AND OSCE BREAKTHROUGHS ?
Proposed areas of work for think tanks, academia, business and civil society: i) Transparency and Accountability; ii) Par cipa on; and iii) Deepening the Knowledge Base.
• It calls on states to review procedures, prac ces and legisla on on communica ons surveillance and "to establish or maintain exis ng independent, effec ve domes c oversight mechanisms capable of ensuring transparency, as appropriate, and accountability for State surveillance of communica ons, their intercep on and collec on of personal data.”
• It also asks U.N. human rights chief to present a report to the U.N. Human Rights Council and the U.N. General Assembly on the protec on and promo on of the right to privacy in domes c and extraterritorial surveillance and the intercep on of digital communica ons and collec on of personal data, including on a mass scale.
• At the same me, the challenge of reconciling the occasionally conflic ng impera ves of ensuring na onal security and respec ng human rights cannot be ignored by governments or ci zens alike. At the mul lateral level, the UN will have to begin to address the cyber security issue in a more coherent fashion. UN Security Council (CTC/CTED) – ICT4Peace Project
• It calls on states to review procedures, prac ces and legisla on on communica ons surveillance and "to establish or maintain exis ng independent, effec ve domes c oversight mechanisms capable of ensuring transparency, as appropriate, and accountability for State surveillance of communica ons, their intercep on and collec on of personal data.”
• It also asks U.N. human rights chief to present a report to the U.N. Human Rights Council and the U.N. General Assembly on the protec on and promo on of the right to privacy in domes c and extraterritorial surveillance and the intercep on of digital communica ons and collec on of personal data, including on a mass scale.
• At the same me, the challenge of reconciling the occasionally conflic ng impera ves of ensuring na onal security and respec ng human rights cannot be ignored by governments or ICT4Peace at SDG Summit in New York Countering Violent Extremism & Mobile Advocacy in Myanmar
Thank You ! danielstauff[email protected]